Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature] Support for Preserving X-Forwarded-Host in AKS Application Routing Add-on #4811

Open
Soren-Knudsen opened this issue Feb 22, 2025 · 0 comments
Labels
feature-request Requested Features

Comments

@Soren-Knudsen
Copy link

Is your feature request related to a problem? Please describe.
The AKS Application Routing add-on currently does not support the annotation of `nginx.ingress.kubernetes.io/use-forwarded-headers. In a standard self-managed NGINX ingress controller, this annotation allows the correct processing of forwarded headers—especially X-Forwarded-Host. Without support for this annotation, our applications receive internal DNS values rather than the intended public domain, causing issues with authentication, logging, and routing.

Describe the solution you'd like
I would like the AKS Application Routing add-on to support the nginx.ingress.kubernetes.io/use-forwarded-headers annotation. This would enable the managed NGINX ingress controller to preserve and correctly forward standard headers like X-Forwarded-Host, X-Forwarded-Proto, and X-Forwarded-For. Allowing this configuration would ensure that the original request information from upstream (e.g., Azure Front Door) is maintained, without needing non-standard workarounds or a custom ingress controller.

Describe alternatives you've considered
Currently, the alternatives include:

  • Configuring Azure Front Door to set custom headers (e.g., a non-standard header) and modifying application logic to rely on them.
  • Deploying a self-managed NGINX ingress controller with full configuration control, which increases operational overhead and deviates from the managed experience offered by the application routing add-on.

Both alternatives introduce extra complexity and are less desirable than a native solution within the add-on.

Additional context
Accurate forwarding of headers is essential for correct authentication, logging, and routing in enterprise scenarios. This feature would significantly improve the usability of the managed Application Routing add-on, making it a more robust option for production workloads that depend on precise client and request information.

@Soren-Knudsen Soren-Knudsen added the feature-request Requested Features label Feb 22, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature-request Requested Features
Projects
None yet
Development

No branches or pull requests

1 participant